Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications 2006
DOI: 10.1109/infocom.2006.233
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Security for Network Coding File Distribution

Abstract: Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic signatures and hashes. However, these techniques do not apply well to more elegant schemes that use network coding techniques for efficient content distribution.Architectures that use network coding are prone to jamming attacks where the introduction of a few corrupted blocks can quickly result in a large number of bad blocks propagating through th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
239
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 254 publications
(239 citation statements)
references
References 34 publications
0
239
0
Order By: Relevance
“…The fundamental insight of network coding is that information to be transmitted from the source in a session can be inferred, or decoded, by the intended receivers, and does not have to be transmitted verbatim. The benefits for coding at intermediate nodes include high throughput [1], [3], efficient routing algorithm design [17], energy savings in wireless networking [18], and security [19]. Network coding may be performed over a large finite field, as in ReedSolomon codes, or over a binary field, as in fountain codes [20], [21].…”
Section: Related Workmentioning
confidence: 99%
“…The fundamental insight of network coding is that information to be transmitted from the source in a session can be inferred, or decoded, by the intended receivers, and does not have to be transmitted verbatim. The benefits for coding at intermediate nodes include high throughput [1], [3], efficient routing algorithm design [17], energy savings in wireless networking [18], and security [19]. Network coding may be performed over a large finite field, as in ReedSolomon codes, or over a binary field, as in fountain codes [20], [21].…”
Section: Related Workmentioning
confidence: 99%
“…Existing schemes use specialized homomorphic hash functions or homomorphic digital signatures. In hash-based schemes [36,21], the source uses a homomorphic hash function to compute a hash of each native data packet and sends these hashes to intermediate nodes via an authenticated channel. The homomorphic property of the hash function allows nodes to compute the hash of a coded packet out of the hashes of native packets.…”
Section: Related Workmentioning
confidence: 99%
“…Hence it is possible to use normal hash functions, such as SHA1, to verify the correctness of a data block by comparing the hash of each received data block to the corresponding hash provided by the source. With network coding, the effect of pollution attack becomes more serious and harder to detect [14] [15] [16] for two reasons: First, each bogus block can be encoded with regular data blocks before being propagated in the network. Second, the traditional hash functions, e.g., SHA1, are no longer practical since the encoded blocks received by each peer can-not be predetermined by the source.…”
Section: Homomorphic Hashingmentioning
confidence: 99%
“…To defend against such attacks, homomorphic hash functions (HHFs) have been proposed to provide a mechanism for verifying the integrity of the encoded data blocks received from the network. In a nutshell, HHFs offer a nice property that the hash value of any encoded data block can be derived from the hash values of the original data blocks, based on which we can identify the bad encoded data blocks without decoding them [14] [15]. Hence, it can effectively prevent the propagation of the bogus data blocks.…”
mentioning
confidence: 99%